BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

IE createTextRange()

Disclosed March 22, 2006    Fully Patched

Vulnerability Description:

A remote code execution vulnerability exists within Internet Explorer which may allow for a remote attacker to execute arbitrary code under the context of the logged in user. This vulnerability requires minimal user-interaction.

Vendors:

Microsoft

Vulnerable Software/Devices:

Internet Explorer 5.01
Internet Explorer 6

Vulnerability Severity:

High

Exploit Availability:

N/A

Exploit Impact:

Local Code Execution
A web browser remote code execution vulnerability has a very high impact since the source of the malicious payload can be any site on the Internet. An even more critical problem is generated when clients are administrators on their local hosts, which would run the malicious payload with Administrator credentials.

BeyondTrust Prevention and Detection:

BeyondTrust's Blink® Personal Edition protects from this vulnerability.
BeyondTrust's Blink® Professional Edition protects from this vulnerability.
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

Patch:
Microsoft Patch - MS06-013

Mitigation:

Since this vulnerability is patched, the primary mitigation for this vulnerability would be to apply MS06-013. A third-party patch was also available from eEye Research, but eEye suggests the removal of this patch since the official Microsoft patch is now available. However, other mitigation is available by disabling active scripting for non-trusted sites as detailed in KB240797.

Links:

CVE-2006-1359
First Public PoC Code Disclosure (Non-Malicious Payload - Executes calc.exe)

CVE(s):

None

Leave a Reply